minimaxir / neural-doodleLinks
Turn your two-bit doodles into fine artworks with deep neural networks, generate seamless textures from photos, transfer style from one image to another, perform example-based upscaling, but wait... there's more! (An implementation of Semantic Style Transfer.)
☆11Updated 9 years ago
Alternatives and similar repositories for neural-doodle
Users that are interested in neural-doodle are comparing it to the libraries listed below
Sorting:
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- A facebook profile and reconnaissance system☆57Updated 10 years ago
- ☆63Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Fun with Amazon AWS and Maltego☆30Updated 8 years ago
- [Python] Google Scraper & Mass Exploiter☆29Updated 3 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- A nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.☆29Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆32Updated 9 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 3 years ago
- ☆39Updated 6 years ago
- ☆27Updated 8 years ago
- Machines created to speed up analysis inside of Maltego☆16Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Scapy hands-on at #GreHack16☆15Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- The official repo of BSIS☆14Updated 13 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- Download files out of open AWS buckets☆38Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 5 years ago
- Command line tool that enables automated penetration testing in the Microsoft stack using OWASP ZAP☆21Updated 10 years ago